VIRTUAL V TRADITIONAL TEAMS v Traditional Teams ” Please respond to the following:

  • Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity.
  • What are two issues companies might face when supporting virtual teams.
    • Investigate one real-life company that successfully uses virtual teams.  What strategies are they using to address the issues you identified.


Due Week 4 and worth 125 points

Convince your local public library to offer self-serve kiosks so patrons can check their materials in and out.

1. Write a proposal of not more than 650 words that evaluates the operational, technical, and economic feasibility of these kiosks.

2. Draw use-case diagrams that illustrate how a patron would interact with the kiosk. These diagrams should illustrate all of the interactions in enough detail to derive functional requirements for the kiosk.

  • Assume that all materials and library cards carry a unique bar code.
  • The patron should have the option to receive a receipt for items checked in or out.

3. Write sample instructions on how to use the kiosk. The library intends to post these instructions on a sign next to the kiosk, so they must be short (not more than 350 words), clear, complete, and well organized.

IT SUPPORT FOR VIRTUAL TEAMS organizations have branches that are located in multiple countries. Some of these organizations develop software and take advantage of the global talent pool of software developers, while others have global technical support teams, customer service, and so on. Virtual teams are created when two or more people work together from different locations, organizations, times zone, and / or time shifts. Global organizations use virtual teams in order to provide global support, reduce travel costs, reduce training costs, and take advantage of local cultural knowledge that may impact the organization’s operations.

Write a two to three (2-3) page paper in which you:

  1. Examine five issues that the IT department is likely to face when it comes to supporting virtual teams.
  2. Describe five advantages and five disadvantages of using virtual teams for the organizations described in the scenario.
  3. Describe challenges imposed by:
  4. IT / IS national standards and propose how they could be handled or resolved.
  5. Protocols and propose how they could be handled or resolved.
  6. Procedures on virtual teams and propose how they could be handled or resolved.
  7. Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity.
  8. Use at least three quality resources in this assignment.

DISCUSSION BOARD learned about the following emerging threats that are likely to shape the security landscape in the future:

  • Social engineering
  • Mobile devices used as bots
  • Scams by questionable security consulting or software firms that use fear tactics to get users to purchase their product to remove security problems
  • Data-focused attacks
  • Cloud computing
  • Expansion of malware

Answer the following question(s):

In your opinion, which threat poses the greatest risk to Microsoft Windows applications? Why?

DISCUSSION BOARD learned about the traditional SDLC (waterfall) and agile methods of software development. Where SDLC is known for distinct, rigid phases, the agile method has smaller, flexible development cycles (sprints).

Answer the following question(s):

  1. In your opinion, does the SDLC or agile method ensure greater success in incorporating adequate security into an application’s code? Why?

INFERENTIAL STATISTICS : Spearman’s rs and Chi-Square Tests

The following multiple choice quiz covers the Spearman’s rs and Chi-Square tests.

I will be starting the quiz once the bid is made and post the questions.

I Have 1 hourand half Twenty minutes to complete the exam.

Price Negotiable

IDENTIFYING AND REMOVING MALWARE FROM WINDOWS SYSTEMS each question completely. 100% original work, must be in your own words.

1. What is the one thing that a virus, a worm, spyware, and malicious code have

in common? What are the differences among these three threats: a virus, a

worm, and spyware?

2. How often should you update your antivirus protection?

3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD?

4. Is the manual quick scan good enough protection for a system?

5. What best practices for the workstation domain that can mitigate the risks and

threats caused by malicious code?

6. If you have an up-to-date antivirus program, do you still need a malware

detection program like Windows Defender?

7. What are some of the most common symptoms of malware?

8. What risk or threat do malware






The meaning and interpretation of: p < .05

Bimodal Distributions

Normal Distributions

Descriptive Statistics

Inferential Statistics

Spearman’s rs

Chi Square Test (X2)

Independent Sample t-test

Paired t-test



Correlation coefficient of 1.00

Correlation coefficient of .00

Quantitative research

Qualitative research

Deductive approach

Inductive approach

Research questions and research design

Parametric tests

Non-parametric tests

Pearson’s Product Moment r



The Final Paper for this course will enable you to identify 2 data sets and discuss appropriate structures of the datasets.

Your final paper should meet the outlined criteria:

  • Topic based on dataset
  • Describe the dataset fields
  • Summary of the data in the dataset
  • Research content (at least 1000 words and 4 references – 3 must be scholarly peer-reviewed articles)
  • Create visualizations using R Language (ggplot2) (Discuss findings)